The management routers have ssh open to the world for OOB access.
As it listens on the standard port 22/tcp, it's subject to a lot of bruteforce attempts
They're all unsuccessful as we use key auth, which has been improved with T163969, but those are still:
1/ flooding the logs
2/ occasionally overwhelming the CPU
The next step is to move the ssh port to a different port (eg. 2222) to reduce most of those attempts.
The .ssh/config file will need to be updated accordingly so normal and emergency access stays smooth.